{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

True Names Paper - 1 Ty Taborn CMSC102 Section 0201...

Info icon This preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
1 Ty Taborn CMSC102 Section: 0201 ID #: 108824539 1
Image of page 1

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
2 Question #1: There are many reasons why people find it important to use cryptographic techniques. According to the True Nyms and Crypto essay some of these reasons include, “ privacy, fear of reprisal by employees or other groups, avoidance of profiles of their activities and interest, posting to controversial newsgroups or support groups (such as ‘alt.recovery’ or rapes and incest recovery groups) whistleblowing [sic], and floating of a controversial ideas.”(May, 39) Eric Hughes and Hal Finney were the first Cypherpunks to write the code for remailers, they wrote the code using Perl and C programming languages. Remailers are an effective way to hide the identity of someone who is sending an email. The way a remailer works according to pcmag.com is by, “forward[ing] e-mail anonymously stripping out the sender's name and e-mail address”. Pcmag.com goes on to compare using a remailer to dropping a letter in a postal service mailbox with out including a return address. Eric Hughes being a Cyberpunk, believed that he was making the world a better places by embracing and widely using cryptographic techniques. His vision seems to be very noble considering the reasons listed above for using remailers, but it also seems very irresponsible because the technology could be used to do criminal things. For example the essay says that the remailers were used to, “ publish the secrets of the Church of Scientology, to disclose military secrets, and, not surprisingly, for flames, insults, and anonymous attacks”(May, 41). Because there was no way to trace the emails court-orders and lawsuits were, “ineffective in revealing the identities of those sending the mail.”(May, 41) 2
Image of page 2
3 Another remailing system was set up by a guy names Julf Helsigus. Unfortunately for him is system kept the information that linked the actually email address of the send and the pseudonyms. Because this record existed, it was the target of many court orders and lawsuits. Eventually Julf had to shut down his system.
Image of page 3

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern